This IP address has been reported a total of 681
times from 358 distinct
sources.
103.139.192.105 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-10-06T12:13:55.856347+00:00 Linux13 sshd[706526]: Invalid user dev from 103.139.192.105 port 33 ... show more2024-10-06T12:13:55.856347+00:00 Linux13 sshd[706526]: Invalid user dev from 103.139.192.105 port 33192
2024-10-06T12:13:55.858369+00:00 Linux13 sshd[706526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.192.105
2024-10-06T12:13:57.851837+00:00 Linux13 sshd[706526]: Failed password for invalid user dev from 103.139.192.105 port 33192 ssh2
2024-10-06T12:14:51.768273+00:00 Linux13 sshd[709814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.192.105 user=root
2024-10-06T12:14:53.782038+00:00 Linux13 sshd[709814]: Failed password for root from 103.139.192.105 port 59932 ssh2
2024-10-06T12:16:54.991926+00:00 Linux13 sshd[717789]: Invalid user ubuntu from 103.139.192.105 port 59034
2024-10-06T12:16:54.993955+00:00 Linux13 sshd[717789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.192.105
2024-10-06T12:16:56.892857+00:00 Linux13 sshd[717789]
... show less
Oct 6 14:36:15 server2 sshd\[20767\]: Invalid user dev from 103.139.192.105
Oct 6 14:41:29 s ... show moreOct 6 14:36:15 server2 sshd\[20767\]: Invalid user dev from 103.139.192.105
Oct 6 14:41:29 server2 sshd\[21132\]: Invalid user oracle from 103.139.192.105
Oct 6 14:42:19 server2 sshd\[21172\]: Invalid user ftpuser from 103.139.192.105
Oct 6 14:43:11 server2 sshd\[21220\]: Invalid user admin from 103.139.192.105
Oct 6 14:44:02 server2 sshd\[21289\]: Invalid user steam from 103.139.192.105
Oct 6 14:44:55 server2 sshd\[21335\]: Invalid user server from 103.139.192.105 show less
SSH bruteforce attempted to NauticHosting\'s infrastructure. nautichosting.com \(mia-01.mcp\)<b ... show moreSSH bruteforce attempted to NauticHosting\'s infrastructure. nautichosting.com \(mia-01.mcp\)
... show less
2024-10-06T17:52:34.554853 singularity2 sshd[64708]: Connection from 103.139.192.105 port 42708 on 1 ... show more2024-10-06T17:52:34.554853 singularity2 sshd[64708]: Connection from 103.139.192.105 port 42708 on 10.0.0.7 port 2222 rdomain ""
2024-10-06T17:52:35.832338 singularity2 sshd[64708]: Invalid user sez from 103.139.192.105 port 42708
2024-10-06T17:52:36.055219 singularity2 sshd[64708]: Disconnected from invalid user sez 103.139.192.105 port 42708 [preauth]
2024-10-06T17:53:29.152128 singularity2 sshd[64729]: Connection from 103.139.192.105 port 44404 on 10.0.0.7 port 2222 rdomain ""
2024-10-06T17:53:30.379777 singularity2 sshd[64729]: Invalid user ftpuser from 103.139.192.105 port 44404
... show less
DNS CompromiseDNS PoisoningFraud OrdersDDoS AttackFTP Brute-ForcePing of DeathPhishingFraud VoIPOpen ProxyWeb SpamEmail SpamBlog SpamVPN IPPort ScanHackingSQL InjectionSpoofingBrute-ForceBad Web BotExploited HostWeb App AttackSSHIoT Targeted
2024-10-06T12:17:48.490551+02:00 zrh02.ch.pop.as202427.net sshd[2246119]: Invalid user user1 from 10 ... show more2024-10-06T12:17:48.490551+02:00 zrh02.ch.pop.as202427.net sshd[2246119]: Invalid user user1 from 103.139.192.105 port 41210
2024-10-06T12:20:20.021503+02:00 zrh02.ch.pop.as202427.net sshd[2246672]: Invalid user server from 103.139.192.105 port 36482
... show less
Oct 6 04:12:27 b146-57 sshd[3118177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreOct 6 04:12:27 b146-57 sshd[3118177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.192.105
Oct 6 04:12:29 b146-57 sshd[3118177]: Failed password for invalid user user1 from 103.139.192.105 port 45436 ssh2
Oct 6 04:19:45 b146-57 sshd[3118566]: Invalid user server from 103.139.192.105 port 36502
... show less
Oct 6 05:55:50 fremontnet-scca-01 sshd[13806]: Failed password for root from 103.139.192.105 port 3 ... show moreOct 6 05:55:50 fremontnet-scca-01 sshd[13806]: Failed password for root from 103.139.192.105 port 34058 ssh2
Oct 6 06:03:14 fremontnet-scca-01 sshd[13907]: Failed password for root from 103.139.192.105 port 59810 ssh2 show less
Oct 6 09:48:14 xproot sshd[2106681]: Invalid user ftpuser from 103.139.192.105 port 33330
Oct ... show moreOct 6 09:48:14 xproot sshd[2106681]: Invalid user ftpuser from 103.139.192.105 port 33330
Oct 6 09:48:14 xproot sshd[2106681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.192.105
Oct 6 09:48:16 xproot sshd[2106681]: Failed password for invalid user ftpuser from 103.139.192.105 port 33330 ssh2
Oct 6 09:49:19 xproot sshd[2106708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.192.105 user=root
Oct 6 09:49:21 xproot sshd[2106708]: Failed password for root from 103.139.192.105 port 42820 ssh2
... show less
Brute-ForceSSH
Anonymous
2024-10-06T09:43:52.762576+00:00 cust1009-1 sshd[209019]: Disconnected from authenticating user root ... show more2024-10-06T09:43:52.762576+00:00 cust1009-1 sshd[209019]: Disconnected from authenticating user root 103.139.192.105 port 48260 [preauth]
2024-10-06T09:46:41.280479+00:00 cust1009-1 sshd[209123]: Disconnected from authenticating user root 103.139.192.105 port 41086 [preauth]
2024-10-06T09:47:30.396420+00:00 cust1009-1 sshd[209135]: Disconnected from authenticating user root 103.139.192.105 port 60646 [preauth]
... show less
Brute-ForceSSH
Anonymous
Oct 6 11:16:44 con01 sshd[1479001]: Invalid user oracle from 103.139.192.105 port 52594
Oct ... show moreOct 6 11:16:44 con01 sshd[1479001]: Invalid user oracle from 103.139.192.105 port 52594
Oct 6 11:16:45 con01 sshd[1479001]: Failed password for invalid user oracle from 103.139.192.105 port 52594 ssh2
Oct 6 11:17:35 con01 sshd[1487990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.139.192.105 user=root
Oct 6 11:17:37 con01 sshd[1487990]: Failed password for root from 103.139.192.105 port 38158 ssh2
Oct 6 11:18:29 con01 sshd[1497095]: Invalid user admin from 103.139.192.105 port 53682
... show less
Brute-ForceSSH
Anonymous
2024-10-06T14:46:08.374977+05:30 armvps.annahita.org sshd[948418]: Invalid user oracle from 103.139. ... show more2024-10-06T14:46:08.374977+05:30 armvps.annahita.org sshd[948418]: Invalid user oracle from 103.139.192.105 port 54212
2024-10-06T14:47:51.955302+05:30 armvps.annahita.org sshd[948724]: Invalid user admin from 103.139.192.105 port 40778
... show less